w00p

@w00p@infosec.exchange
21 Followers
167 Following
986 Posts

I successfully tested a LSASS dumping technique on a Windows 10 lab machine, which we encountered on a recent Incident Response engagement (no EDR, default Defender installed).

The "MiniDumpWriteDump" technique, as described here [1], was successful in writing the LSASS process to disk.

However, as soon as I tried to copy the dump to my Kali machine, Defender jumped into action, prohibited access to the LSASS dump, and removed the file to the quarantine. And here is the catch.

I browsed to the following folder:
C:\ProgramData\Microsoft\Windows Defender\Quarantine

In the ResourceData folder, you will find different sub-folders (or not, if Defender never quarantined something on that host), each folder containing a quarantine file.

The files are encrypted with a static key that leaked years ago, and this 10-year-old code snippet is still sufficient to decrypt the files back to their original state. [2]

Long story short: I copied the encrypted file to my Kali machine, decrypted it using the Python code from [2], and extracted the credentials and hashes with pypykatz. [3]

Classic example of "No, it's not enough when your AV blocked or removed a threat". As you can see, an attacker can easily get the LSASS dump, even if Defender removed it from the disk ¯\_(ツ)_/¯

[1 ]https://www.ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass
[2] https://raw.githubusercontent.com/malmoeb/DFIR/refs/heads/master/quarantine.py
[3] https://github.com/skelsec/pypykatz

An einem internen Kritiker der M365-Migration hat der Luzerner Regierungsrat allerdings nicht festgehalten. Das Online-Magazin Republik berichtet, der "Chief Information Security Officer (CISO) des Kantons sei wegen seiner Bedenken zum zeitlichen Fahrplan von Microsoft 365" Anfang Juni freigestellt worden.

Der IT-Sicherheitschef habe den Luzerner Regierungsrat darauf hingewiesen, "dass der Kanton die erforderlichen Hausaufgaben zur IT-Sicherheit rund um das Projekt Microsoft Cloud noch nicht erfüllt habe, was wiederum verschiedene Quellen der Republik bestätigt haben". Der CISO trat deshalb auf die Bremse. Doch die Kantonsregierung bestand auf ihrem Zeitplan, stattdessen musste laut Republik der Kritiker seinen Platz räumen.

"Bis heute hat das zuständige Finanzdepartement weder intern noch öffentlich über die Personalie informiert", schreibt das Medium. Der IT-Sicherheitschef selbst war für eine Stellungnahme nicht erreichbar, so das Magazin, die Kantonsregierung dementierte derweil: "Der Weggang hat keinen Zusammenhang mit der Einführung von Microsoft 365 beim Kanton Luzern".

https://www.heise.de/news/Schweizer-Kanton-feuert-CISO-im-Streit-um-Nutzung-der-Microsoft-Cloud-10451987.html

Schweizer Kanton feuert CISO im Streit um Nutzung der Microsoft-Cloud

Die zunehmende Nutzung von Cloud-Anwendungen des US-Softwareunternehmens erzeugt auch in der Schweiz wachsenden Unmut.

heise online
Spanish grid operator to energy producers: "Watts going on??"

Google's Threat Intelligence Group and the Citizen Lab each issued reports on a highly customized attack against email accounts of Keir Giles, a Russia expert based in the U.K.

https://therecord.media/keir-giles-russia-expert-email-attack-gtig-citizen-lab-reports

Takeover of British Russia expert’s email accounts used novel phishing tactic

Google's Threat Intelligence Group and the Citizen Lab each issued reports on a highly customized attack against email accounts of Keir Giles, a Russia expert based in the U.K.

39 hours of digging through ruins.

Kyiv rescue crews have ended operations after one of Russia’s largest strikes.
A missile hit a 9-story building on Tuesday.

📍 23 bodies recovered at the site
📍 28 killed across the city
📍 140+ injured

Photo Suspilne, Hromadske

This might be a niche persistence mechanism, but during an investigation, I stumbled upon the following file on a Linux server:

/home/<user>/.config/autostart/set_trusted.desktop

With the following content:

[Desktop Entry]
Encoding=UTF-8
Exec=/usr/bin/set_trusted.sh
Name=Set trusted
Comment=Set desktop file trusted
Terminal=false
OnlyShowIn=GNOME
Type=Application
X-GNOME-Autostart-enabled=true

Do you spot the "exec" command? An attacker could replace the legitimate path to the "set_trusted.sh" file with an arbitrary file, thereby (potentially?) gaining code execution whenever the user logs in.

I don't know how widespread that feature is, and how many distributions are supporting it (Nautilus?), but maybe it will come in handy for someone :)

Sandflysecurity is/will be releasing forensics scripts for Linux live anaysis: https://github.com/sandflysecurity/sandfly-forensic-scripts

#linux #dfir #forensics

GitHub - sandflysecurity/sandfly-forensic-scripts: Small scripts to help with Linux forensics and incident response.

Small scripts to help with Linux forensics and incident response. - GitHub - sandflysecurity/sandfly-forensic-scripts: Small scripts to help with Linux forensics and incident response.

GitHub

Just updated my diagram of Trump’s crypto entanglements based on his most recent financial disclosures 😵‍💫

Full-size image: https://storage.mollywhite.net/trump-family-crypto-projects.png
Disclosures: https://oge.app.box.com/s/k0hxcezgk7j1cyqoue16cillsi9srmfu

#crypto #cryptocurrency #USpolitics #USpol

As WhatsApp’s introduction of targeted ads goes to show, “if you’re not paying for it, you’re not the customer, you’re the product.” https://www.theverge.com/news/687519/whatsapp-launch-advertising-status-updates
WhatsApp is officially getting ads

WhatsApp is getting ads, as Meta has announced that it will now allow businesses to promote their products and services through its status feature.

The Verge

Quote: "In less than three months' time, almost no civil servant, police officer or judge in Schleswig-Holstein will be using any of Microsoft's ubiquitous programs at work. […] The current first phase involves ending the use of Word and Excel software […]. Over the next few years, there will also be a switch to the Linux operating system in order to complete the move away from Windows."

https://www.france24.com/en/live-news/20250613-we-re-done-with-teams-german-state-hits-uninstall-on-microsoft

1/2

#EU_OS #GermanStack #EuroStack

'We're done with Teams': German state hits uninstall on Microsoft

At a time of growing concern over the power of the world's mighty tech companies, one German state is turning its back on US giant Microsoft.

FRANCE 24
×
@stgl Always interesting to see people break open devices i so often see but isn't allowed to break. Was a nice read thanks.
@stgl Love the 'disclosure timeline' 😁
@stgl Excellent analysis 
@stgl Thanks for this interesting blog post! Do they publish their kernel source or is it another GPL violation?
@zeewox I didn't ask, might be something to try :) I think GPL violations are quite common in these kinds of things

@zeewox They don't need to publish any source code, this is a very common misconception.

@stgl

@amszmidt @zeewox Please explain. They use a modified kernel and distribute it in binary form, how are they not required to also distribute the source code?

@stgl @zeewox You changed the question slightly.

Does the GPL require that source code of modified versions be posted to the public? (https://www.gnu.org/licenses/gpl-faq.html#GPLRequireSourcePostedPublic). --- "No."

The question here is if the device was made available to the public, or clients ... clients would be able to request the source code, but not random person since the device is not theirs.

Frequently Asked Questions about the GNU Licenses - GNU Project - Free Software Foundation

@amszmidt @zeewox Okay, fair point. But these devices are freely available on Ebay, so basically everyone can own one. So anyone can get entitled to access the source code, because surely, this does not only apply to "direct" customers, right?

@stgl I think you'd have to ask the re-seller (I am assuming! since this is eBay) for the code, not the manufacturer since the re-seller is re-distributing the device and not the manufacturer. So to hold the manufacturer responsible here is unfair.

I.e., if you get a copy of some #GNU #GPL program from me, I'm not responsible if you re-distribute it later and refuse to provide the source code.

@zeewox

@amszmidt @zeewox Interesting, I guess that makes sense.

@stgl Did they publish their GPL sources for Linux etc.?

(btw, nice to see an ARM926EJ-S in the wild, these things can run a subset of Java bytecode in hardware)

@jn Not sure, I didn't ask. Might be something to try :)

Yes, old-school ARM9. Random fact: the Ti Nspire calculators also all have a ARM926EJ afaik.

@stgl yup, and the Hackspire people have written one of the best public resources about Jazelle

https://hackspire.org/index.php/Jazelle

Jazelle - Hackspire

@stgl Oh no! This is the SumUp Solo incident all over again 🙈

They do indeed use the Linux-part of the device also during payment processing... While most swiss merchants' POS systems will speak the TIM protocol with the device, you can throw Worldline a few € per month and they will remotely install a ZVT-to-TIM service on the device. That way, merchants using "german" POS software can use their existing protocols.

@stgl thanks for the nice writeup. Sounds lika a lot of phun.
@stgl Fascinating! And useful!

@stgl Doom port in 3.. 2.. 1.. ;-)

Would be interesting if the root console could be configured to also listen on the network interface.. weirdest mini-server ever.

@stgl
"Wait, what!? That’s it? I’m in?"

:-D

@stgl
"The “insecure” Linux, running on the second processor, mp2, only handles ... the updating,..."

Would this open up an insecure update path?

@stgl
TBH I'm really in awe of your hardware capabilities. I'm too short sighted to do such delicate works.
@PiiiepsBrummm Not easily no, there are signature checks in place. But something might be possible with some more effort and time, I merely scratched the surface here

@stgl "The system runs a 3.6 kernel, built with Buildroot 2010.02 (!) in February of 2023"

so it's basically an up to date debian system

@stgl

Could not resist and bought one ... 😅

The rootfs is such a mess !

@Xilokar Very cool! Did you end up dumping the same version? Did my tool work? I would love to have a chat sometime about your insights and your thoughts about the (presumed) system architecture. Feel free to PM me if you're interested!

@stgl

I'd love too having a chat about all of this too!

But first let me dive a little into the internals...
I've only looked at it 3 hours yesterday night 😁

Did not have to use your tool (rootshell on the exposed debug port, and exported the rootfs over network)

This way, I have an untampered running device.

The version is newer, at least for the bootloader:version_id:v1.7c+00000:gad03c1b Dec 17 2019 15:48:45 owi

Did not figure yet how to get the "firmware" version 😅

@Xilokar Cool, just let me know.

Ah of course, that's the smart way, nice! Weird that there are still vulnerable devices floating around more than half a year after disclosure...

@stgl
I was also surprised ! (although, stuff on ebay are somehow outdated...)

But maybe they are confident that it is not a major issue...

Let's try to prove them wrong 😁